Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques. ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities … More Under the hood of Wslink’s multilayered virtual machine

ESET Research discovers scheme to steal cryptocurrency from Android and iPhone users

The attackers distributed malicious apps via fake and legitimate sites, and Telegram and Facebook groups. This sophisticated malicious cryptocurrency scheme targets mobile devices using Android or iOS operating systems (iPhones). The malicious apps were distributed through fake websites, mimicking legitimate wallet services and promoted with ads placed on legitimate sites using misleading articles, and via … More ESET Research discovers scheme to steal cryptocurrency from Android and iPhone users

The SMB cybercrime sweet spot: Small and medium in both size and protection

Small and medium businesses (SMBs) have been sprouting up worldwide, owing to the fact that they are often innovative and can be established by pretty much anyone. From 2000 to 2020, there was an increase of over 50% in the number of SMBs worldwide. Although news outlets often focus on cyberthreats targeting nation states and large enterprises, it … More The SMB cybercrime sweet spot: Small and medium in both size and protection

ESET Research discovers Mustang Panda’s Hodur cyberespionage malware: Old tricks, new Korplug variant

Mustang Panda, the cyberespionage group behind this threat, is targeting mainly governmental entities and NGOs in East and Southeast Asia, and some in Europe and Africa. · This cyberespionage campaign dates back to at least August 2021 and is still ongoing as of March 2022. · Mustang Panda, the APT group behind this campaign, is … More ESET Research discovers Mustang Panda’s Hodur cyberespionage malware: Old tricks, new Korplug variant

Defending the data center: The time to act is now

Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults? Why are data centers a prime target? Amid the pandemic and the rise of the remote worker, much attention in cybersecurity has shifted to the distributed workforce. The threats posed by an explosion in … More Defending the data center: The time to act is now